Releases: carvel-dev/kapp-controller
v0.54.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.1/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.1/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:3f57748314829516ea51e0765d5a6c82d7a2a3b4bc5a9b500c473fe65e6ba942
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:0d8261ab27a3e3bdb45d9c64dc7fb8b132cb83476776ad96943ded156d13e336
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:3f57748314829516ea51e0765d5a6c82d7a2a3b4bc5a9b500c473fe65e6ba942 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:0d8261ab27a3e3bdb45d9c64dc7fb8b132cb83476776ad96943ded156d13e336 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Update Golang version to 1.23.3 by @devanshuVmware in #1654
Full Changelog: v0.54.0...v0.54.1
📂 Files Checksum
e707034197cabcf1cab6599dce5e00ca0b99559c4528644ade07f33baa1b5b12 ./release.yml
cc8282b7919cadab1032d68450d5c5a965b8c4b3f8f393aaf4f39cf2eeee8204 ./kctrl-darwin-amd64
f5c1c6b15e3118bad2e6db3229a32fe853b68ffb6f5572f17cdedab4146fb060 ./kctrl-darwin-arm64
8105ca2150436848e76327933f1ba7703a3197c74e624a712d336866de92072a ./kctrl-linux-amd64
157728fb39e5f047dbfcf6b28fd84f6075da30751dd0a363e56f3622b7f054fa ./kctrl-linux-arm64
5e28e35d15f14b2d01517fa41517a312a8ba1a89d106722246cabfbd3ebe091b ./kctrl-windows-amd64.exe
49311ecd5c0bad88c9480cb75c257ebf29ca731c4af7baa591f5a36e4bd6c1c2 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.54.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.0/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.54.0/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:98785c066e759ec7c2ac60c8aa9c97d2901de843180611b0dc1301e59cafc374
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:0cc25cc12365d0976eef55b9d1b3a5ee193fca4baaa1c13fa3c6768013c909e4
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:98785c066e759ec7c2ac60c8aa9c97d2901de843180611b0dc1301e59cafc374 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:0cc25cc12365d0976eef55b9d1b3a5ee193fca4baaa1c13fa3c6768013c909e4 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Bump controller-runtime to v0.18.5 by @rohitagg2020 in #1644
- Bump k8s.io/apiserver to v0.30.1 by @rohitagg2020 in #1644
- Bump golang to 1.22.9 by @rohitagg2020 in #1644
- Bug fixed where kctrl package release does not work as expected inside a Kubernetes pod by @devanshuVmware in #1638
Full Changelog: v0.53.1...v0.54.0
📂 Files Checksum
0ed9ecaea8e9c897545e94a6192383568ed0ef10a0870245a80af6431cf74346 ./release.yml
eae250c163e61f0ffea6ebb749280fcc0893e26f9509989d60dbe90675001019 ./kctrl-darwin-amd64
2c81fc714fabfebaab8c59533122b27639dba37c3608fa96cd1f8a59143b24d8 ./kctrl-darwin-arm64
f06df7375eb4edc4a7ddb194a0c608d627efa2387faa539552d029d9bd901b9e ./kctrl-linux-amd64
6298cbfa50209ec88f835f32f2a360211162363d8a56bc185b5990976641cfaa ./kctrl-linux-arm64
7b90fd388c7bb3d88bcd3344bff098d51f2107e7aabd87f2dc3d8ecfa96d9f2d ./kctrl-windows-amd64.exe
5327e51c521b6879df5072055233dc583278dec436af0a2cc14cad97c9d5962a ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.53.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.1/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:da1ac76b07c0961ec0a1573615cb8c121fd0a4c443a0bb7f73780242d05161f0
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3d0a4b6be92b0037248b99195b7776e8e39e3e073999c6a44efda9e7587f85b8
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:da1ac76b07c0961ec0a1573615cb8c121fd0a4c443a0bb7f73780242d05161f0 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3d0a4b6be92b0037248b99195b7776e8e39e3e073999c6a44efda9e7587f85b8 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Update dependencies by @rohitagg2020 in #1615
Full Changelog: v0.53.0...v0.53.1
📂 Files Checksum
d09229fec56445e891d586236f56802a7b3b7b7db69ef3410f3c4e2d3abc9a8c ./release.yml
a04c9e50130c0822d5b940aca1d3031fd6d3e065c907d70cd7b33b91199ff521 ./kctrl-darwin-amd64
08b0e63e3f2948ae9ef108d1c0407ffe1c0c35eb635c0347bb0b17263b24e353 ./kctrl-darwin-arm64
008e8543a1389ab29a75470a6f602b569e28fa866f72ddb214df32d57e09ed1c ./kctrl-linux-amd64
3536d4fce287e8979d1c93d44309cf86db88e720b416e38f9346ddc5dfd95b28 ./kctrl-linux-arm64
e89a7b3c402c554397ad8a9169e92d878a978e1d857c59f3c29fb05f46d55c57 ./kctrl-windows-amd64.exe
d63f30752b629ea056af037d32e03975e95858476e875c751a963dd34627ad0e ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.53.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.53.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.53.0/download/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.53.0/download/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:2368019cd18fdd82c08c48f5ba7cf6c2df50e35d7e92a16ec1f36c97538985f3
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:9a39f5df36e21514b5d86e6c02849186a3b0f1b72c68651b70d73f2babde6835
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:2368019cd18fdd82c08c48f5ba7cf6c2df50e35d7e92a16ec1f36c97538985f3 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:9a39f5df36e21514b5d86e6c02849186a3b0f1b72c68651b70d73f2babde6835 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Added partial support for DownwardsAPI with kctrl package release command by @100mik in #1580
- Add defaults for version flag while installing packages using kctrl by @100mik in #1588
- Bumping dependencies and golang by @rohitagg2020 in #1600
Full Changelog: v0.52.0...v0.53.0
📂 Files Checksum
2457bed3b40c46ede4f8c44823dcf5eb05cc4cd1e8b30da05348df4aac2864c7 ./release.yml
0bee8254d2055bc833a197c777d2d79efc06c675c821da196765dacdae5ebeb0 ./kctrl-darwin-amd64
70a2cb40122f4ac750fb21d9e741e056344fcc463e38c7b9981f5a2fdd74bef6 ./kctrl-darwin-arm64
9c33cfaae971718221c44feeca85faa703e7399f2e9d3fc98c9b1160ee765fb3 ./kctrl-linux-amd64
0e8fde1c937c1ad49dd42de8f4a9a41ccbeb3514ced8c83ad15dc04e3f2a9a96 ./kctrl-linux-arm64
b276621bfd1857ed0c841e96f3d4c17de1e450609f227ad3b882af0cc13d7c5f ./kctrl-windows-amd64.exe
883313f4580e7f45865b1a438fba2c3b9c142cd8bb6fb626dfa861ee58b3a335 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.50.6
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.6/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:3cead02490923568114691444b2ad7b5883948461fdd6b8e2c89e156bf407e47
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3364d1229cd0fcf8ffa81653786b8da2c3eb40627a60dfe926eb90d7cc28e38a
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:3cead02490923568114691444b2ad7b5883948461fdd6b8e2c89e156bf407e47 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:3364d1229cd0fcf8ffa81653786b8da2c3eb40627a60dfe926eb90d7cc28e38a --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Fixed Incorrect URL for kapp controller install instruction by @devanshuVmware in #1619
Full Changelog: v0.50.5...v0.50.6
📂 Files Checksum
94d0a61c7c254262562a40103e40f775aa6000bb3e11660b0582c2d0696c8985 ./release.yml
fcf0ca77df0b33e598a9df467a53da8ba50ba71a1bdaeab048832824dd0ec902 ./kctrl-darwin-amd64
be2e3579f12e6df72e2fbe4a943a2d7ec372c102bfc5fd75bad22ceb77b8d12c ./kctrl-darwin-arm64
789de8f69498a2625a9753c66c7c528b919c9ab82ad0bc8c69bf09f8df007c5d ./kctrl-linux-amd64
624c44c4a711a9c7cd0133ae39da77d5d6788ebd0c03af90f469cb345ab85bd5 ./kctrl-linux-arm64
c411a55e675893d3ee274c7fc49538d5933425a244178e85214f41a6b714bdec ./kctrl-windows-amd64.exe
05193b54ecd32b010651dd64e56be49af94d3603f84e50741a3176ea91e2f177 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.50.5
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.50.5/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.50.5/download/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.50.5/download/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:d0cfb16343114064d8d6d78a2aa6b5e4112f921744f9edf5cf7ff66bca27a616
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:4c8786d670bc5111edcd711e5d6628edef51bdf3ab6ed4a7453d46f0fc5a0aa5
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:d0cfb16343114064d8d6d78a2aa6b5e4112f921744f9edf5cf7ff66bca27a616 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:4c8786d670bc5111edcd711e5d6628edef51bdf3ab6ed4a7453d46f0fc5a0aa5 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
What's Changed
- Bumping dependencies by @devanshuVmware in #1596
Full Changelog: v0.50.4...v0.50.5
📂 Files Checksum
69ed9280284b258f45a68afb4929f3e8e2eb1aa26b1498853425b140e42dcad9 ./release.yml
cef462e3d5778f303c51951d81e28ce3a6014105bf21cd3d7813a2911b26834a ./kctrl-darwin-amd64
942e1e4c0289f4f9e71b991fe0d1e113b6fef3448b5fdd32c3d0c6b549e1f535 ./kctrl-darwin-arm64
f55f54eb0711dc5e7972801316044663a48ac4b6569bcb9f7e682a92e6c85b40 ./kctrl-linux-amd64
3c233ee05a28932f74bca9e9350f01922114f1fcc91067fe7a056f4e471b206a ./kctrl-linux-arm64
646d0b444ae1924ee6b84e6a6b08861a402d8e10ee633a7c523703dec07c8cf4 ./kctrl-windows-amd64.exe
f64cb915ae5e3d1ca558e229ea5cc295d1fd7b248c2f8c437f2e79227a989e65 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.52.0
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.52.0/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.52.0/download/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.52.0/download/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:b83bd139c42777bb4428c2ae421f93675a7d6147dff3147471d1be112d9c1eec
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:2f18114d24b1c6d5aff1395bec8873c5177fec672f6c45c9c49eb83a6bdc1e58
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:b83bd139c42777bb4428c2ae421f93675a7d6147dff3147471d1be112d9c1eec --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:2f18114d24b1c6d5aff1395bec8873c5177fec672f6c45c9c49eb83a6bdc1e58 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- The go module name is changed to
carvel.dev/kapp-controller
by #1390 by @joaopapereira in #1557- 🚨 For library users 🚨 note that this is a breaking change on this version, no impact for users that only use the binaries
Full Changelog: v0.51.0...v0.52.0
📂 Files Checksum
4deb3b2a3f579666daa0ee5a289a85dc0da35274d244035e7d2bedc95997b92f ./release.yml
2e631dbaea16186bb6cec158d781748705ea425bd2e89d0a6c173f8ca2be3ca9 ./kctrl-darwin-amd64
4ad82f494d00aba3aa2e471a8721d2dde14e5390064230d418041f693f4bf1dc ./kctrl-darwin-arm64
355e239fd2c8fe952620c301792098b4bcaebdd965d760a1a8283dd0824a3782 ./kctrl-linux-amd64
1959ba7885afb826c3f8760e69cb28a8b8917cb84075c85791c841d8f8f52c94 ./kctrl-linux-arm64
67d4c82c803553cc0ebdb7e9a3c142ca0d65b8685de310e19d9f6d9cdaad5af1 ./kctrl-windows-amd64.exe
e69ca728ee463cc2507bba91279ab986ff1e07e837165d669221462894311e50 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.51.3
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.3/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:80f5ff5a2f2e030a8e5798e9919c00abfd23b4ba672dd854c0c27d4eaf769b18
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:eb161072db8014b262acd33641aea01432f59af046fd71e6e043cb7117bb52a1
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:80f5ff5a2f2e030a8e5798e9919c00abfd23b4ba672dd854c0c27d4eaf769b18 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:eb161072db8014b262acd33641aea01432f59af046fd71e6e043cb7117bb52a1 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Fix Incorrect URL for kapp controller install instruction by @devanshuVmware in #1620
Full Changelog: v0.51.2...v0.51.3
📂 Files Checksum
c4c176ad62cb1fba708bd55d4a670d8b6258d77d67b7e6a2ef5c8a1073a463ba ./release.yml
e2bfbad57dcc0731418c5479cc177d6a5b1e7abe028ab108810e2036741e010e ./kctrl-darwin-amd64
e9cda39b601dd8f1338a10c921821cb9fb790814107fd9769def39666305600c ./kctrl-darwin-arm64
00194617ddafe83ffb1dbe3048709dcb26562f48032568deba2811e80dcaaac0 ./kctrl-linux-amd64
3be24f8d0bed89935d8964c88bc7e34b4b71a7bc65ca4839de160e18dc7b1adf ./kctrl-linux-arm64
5999a4bf3158185973ae3ff0a015e981b420966e92ed55e84a3461d4e7b2dbc2 ./kctrl-windows-amd64.exe
e1bf1f8678e9b3fb2650b97ec0fed56dd5b47f882c945bd544b02ec272a24b88 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.51.2
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.2/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.2/download/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.2/download/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:56f4675eff64fba3d4524b8617bb4c3839a9d05b97014d8e7a02b63f37e0f6b7
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:c200581ffcdb7106cf5a65ed0d42b7e9d2870655d32a8c11534f5543b1ab5811
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:56f4675eff64fba3d4524b8617bb4c3839a9d05b97014d8e7a02b63f37e0f6b7 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:c200581ffcdb7106cf5a65ed0d42b7e9d2870655d32a8c11534f5543b1ab5811 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Bump dependencies by @devanshuVmware in #1597
Full Changelog: v0.51.1...v0.51.2
📂 Files Checksum
7a1618d8bdedff2cc2a1d1339c6b88b011bc9794aee1e6c8c005fd8549723d8a ./release.yml
572393e641ef43455a093790bff328be44182389f2b48c071cf8f778f56b4db7 ./kctrl-darwin-amd64
1c4f354e33f9a0fc2c708979deb33e132a56a279f85e59a4f4f284e1249d9ac4 ./kctrl-darwin-arm64
f7baed2f35f751c6c92d03ff8d9f2d0239ac1d711ed3ac215c0c26cdf8774043 ./kctrl-linux-amd64
7e837eedd7419507d8882f2a0d4a6588d66984a1b88058daeec1524fe36b9d31 ./kctrl-linux-arm64
81761e7f65652d2f479231e73706a79b24dfa1eb047bb934cbf4d0a678963911 ./kctrl-windows-amd64.exe
0daaedc87bd8537095b288cd579878a258d9b4a89197fea0ccb3c2b7d3eb810f ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml
v0.51.1
Installation and signature verification
Installation of kctrl
By downloading binary from the release
For instance, if you are using Linux on an AMD64 architecture:
# Download the binary
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/kctrl-linux-amd64
# Move the binary in to your PATH
mv kctrl-linux-amd64 /usr/local/bin/kctrl
# Make the binary executable
chmod +x /usr/local/bin/kctrl
Via Homebrew (macOS or Linux)
$ brew tap carvel-dev/carvel
$ brew install kctrl
$ kctrl version
Verify checksums file signature
Install cosign on your system https://docs.sigstore.dev/system_config/installation/
The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:
# Download the checksums file, certificate, and signature
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/checksums.txt
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/checksums.txt.pem
curl -LO https://github.com/carvel-dev/kapp-controller/releases/download/v0.51.1/checksums.txt.sig
### Verify the checksums file
cosign verify-blob checksums.txt --certificate checksums.txt.pem --signature checksums.txt.sig --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com
Verify binary integrity
To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature. For instance, if you are using Linux on an AMD64 architecture:
# Verify the binary using the checksums file
sha256sum -c checksums.txt --ignore-missing
Installation of kapp-controller
kapp-controller can be installed by using kapp
kapp deploy -a kc -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.1/download/release.yml
or by using kubectl
kubectl deploy -f https://github.com/carvel-dev/kapp-controller/releases/v0.51.1/download/release.yml
Container Images
Kapp-controller and Kapp-controller-package-bundle images are available in Github Container Registry.
OCI Image URLs
- ghcr.io/carvel-dev/kapp-controller@sha256:bb72e77120569dcb9f51a6a65c9a91a8a4a56fedc1c2939c583dc458d716b718
- ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:265c7dfa7367384dc8e6d152985305d69425970b5f02ce626d5db8002f11199c
Verify container image signature
The container images are signed using Cosign with GitHub OIDC. To validate the signature of OCI images, run the following commands:
# Verifying kapp-controller image
cosign verify ghcr.io/carvel-dev/kapp-controller@sha256:bb72e77120569dcb9f51a6a65c9a91a8a4a56fedc1c2939c583dc458d716b718 --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
# Verifying kapp-controller-package-bundle image
cosign verify ghcr.io/carvel-dev/kapp-controller-package-bundle@sha256:265c7dfa7367384dc8e6d152985305d69425970b5f02ce626d5db8002f11199c --certificate-identity-regexp=https://github.com/carvel-dev --certificate-oidc-issuer=https://token.actions.githubusercontent.com -o text
✨ What's new
- Updating dependencies by @rohitagg2020 in #1579
Full Changelog: v0.51.0...v0.51.1
📂 Files Checksum
32b4585a33beccd30e2d5409d9bdd2059c045f8dd059badf29913afaf7e6bd0a ./release.yml
1afd2c7676f0f52b31fad067265fc407368b49d0451b5054a01d7228f773835f ./kctrl-darwin-amd64
cbcfd347879c6e8b21ed9488a5ef4b43fd5818c40efba574d14d50b1de948b80 ./kctrl-darwin-arm64
99013610f7959d741be971d2fa917c705baec0e97e82aad35e067cdc284276fa ./kctrl-linux-amd64
61aacd3143a73f97d7f190e1b692e7653951c51f1640f9e076a38712b7a81adc ./kctrl-linux-arm64
b7e667dc652e8d1f059850aead71518468f42fbba8a3b2547652fc7ca0569629 ./kctrl-windows-amd64.exe
92916f0d9ea3a5f40aed2b861b6f63be4eb17757feae5fe3b5d873143363e025 ./package.yml
7a6aa35600459a1797a6f0564ae89954e6da035fe54e19b72c573f5b31938a8c ./package-metadata.yml